Warning: Permanently added '10.128.0.168' (ED25519) to the list of known hosts. executing program [ 36.063691][ T6082] syz-executor271[6082]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 36.106562][ T6082] loop0: detected capacity change from 0 to 8192 [ 36.112655][ T6082] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 36.116132][ T6082] REISERFS (device loop0): found reiserfs format "3.5" with non-standard journal [ 36.118662][ T6082] REISERFS (device loop0): using ordered data mode [ 36.120334][ T6082] reiserfs: using flush barriers [ 36.122474][ T6082] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 36.126851][ T6082] REISERFS (device loop0): checking transaction log (loop0) [ 36.130459][ T6082] REISERFS (device loop0): Using tea hash to sort names [ 36.132936][ T6082] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 36.136742][ T6082] [ 36.137356][ T6082] ====================================================== [ 36.139256][ T6082] WARNING: possible circular locking dependency detected [ 36.141092][ T6082] 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Not tainted [ 36.142858][ T6082] ------------------------------------------------------ [ 36.144715][ T6082] syz-executor271/6082 is trying to acquire lock: [ 36.146376][ T6082] ffff800096bb90f0 (&journal->j_mutex){+.+.}-{3:3}, at: do_journal_begin_r+0x2e0/0xe40 [ 36.149043][ T6082] [ 36.149043][ T6082] but task is already holding lock: [ 36.151044][ T6082] ffff0000dd20c410 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write_file+0x64/0x1e8 [ 36.153482][ T6082] [ 36.153482][ T6082] which lock already depends on the new lock. [ 36.153482][ T6082] [ 36.156220][ T6082] [ 36.156220][ T6082] the existing dependency chain (in reverse order) is: [ 36.158662][ T6082] [ 36.158662][ T6082] -> #2 (sb_writers#8){.+.+}-{0:0}: [ 36.160690][ T6082] sb_start_write+0x60/0x2ec [ 36.162078][ T6082] mnt_want_write_file+0x64/0x1e8 [ 36.163638][ T6082] reiserfs_ioctl+0x188/0x42c [ 36.165014][ T6082] __arm64_sys_ioctl+0x14c/0x1c8 [ 36.166442][ T6082] invoke_syscall+0x98/0x2b8 [ 36.167803][ T6082] el0_svc_common+0x130/0x23c [ 36.169204][ T6082] do_el0_svc+0x48/0x58 [ 36.170450][ T6082] el0_svc+0x54/0x158 [ 36.171644][ T6082] el0t_64_sync_handler+0x84/0xfc [ 36.173115][ T6082] el0t_64_sync+0x190/0x194 [ 36.174540][ T6082] [ 36.174540][ T6082] -> #1 (&sbi->lock){+.+.}-{3:3}: [ 36.176502][ T6082] __mutex_lock_common+0x190/0x21a0 [ 36.178104][ T6082] mutex_lock_nested+0x2c/0x38 [ 36.179500][ T6082] reiserfs_write_lock_nested+0x68/0xd8 [ 36.181158][ T6082] do_journal_begin_r+0x2ec/0xe40 [ 36.182652][ T6082] journal_begin+0x110/0x2f4 [ 36.183994][ T6082] reiserfs_fill_super+0x14e0/0x2028 [ 36.185540][ T6082] mount_bdev+0x1e8/0x2b4 [ 36.186894][ T6082] get_super_block+0x44/0x58 [ 36.188208][ T6082] legacy_get_tree+0xd4/0x16c [ 36.189578][ T6082] vfs_get_tree+0x90/0x288 [ 36.190872][ T6082] do_new_mount+0x25c/0x8c8 [ 36.192216][ T6082] path_mount+0x590/0xe04 [ 36.193568][ T6082] __arm64_sys_mount+0x45c/0x594 [ 36.194980][ T6082] invoke_syscall+0x98/0x2b8 [ 36.196344][ T6082] el0_svc_common+0x130/0x23c [ 36.197683][ T6082] do_el0_svc+0x48/0x58 [ 36.198878][ T6082] el0_svc+0x54/0x158 [ 36.200096][ T6082] el0t_64_sync_handler+0x84/0xfc [ 36.201542][ T6082] el0t_64_sync+0x190/0x194 [ 36.202834][ T6082] [ 36.202834][ T6082] -> #0 (&journal->j_mutex){+.+.}-{3:3}: [ 36.204932][ T6082] __lock_acquire+0x3370/0x75e8 [ 36.206435][ T6082] lock_acquire+0x23c/0x71c [ 36.207741][ T6082] __mutex_lock_common+0x190/0x21a0 [ 36.209239][ T6082] mutex_lock_nested+0x2c/0x38 [ 36.210601][ T6082] do_journal_begin_r+0x2e0/0xe40 [ 36.212019][ T6082] journal_begin+0x110/0x2f4 [ 36.213356][ T6082] reiserfs_dirty_inode+0x104/0x204 [ 36.214853][ T6082] __mark_inode_dirty+0x2b0/0x10f4 [ 36.216410][ T6082] reiserfs_ioctl+0x330/0x42c [ 36.217805][ T6082] __arm64_sys_ioctl+0x14c/0x1c8 [ 36.219238][ T6082] invoke_syscall+0x98/0x2b8 [ 36.220587][ T6082] el0_svc_common+0x130/0x23c [ 36.221935][ T6082] do_el0_svc+0x48/0x58 [ 36.223171][ T6082] el0_svc+0x54/0x158 [ 36.224332][ T6082] el0t_64_sync_handler+0x84/0xfc [ 36.225820][ T6082] el0t_64_sync+0x190/0x194 [ 36.227178][ T6082] [ 36.227178][ T6082] other info that might help us debug this: [ 36.227178][ T6082] [ 36.229904][ T6082] Chain exists of: [ 36.229904][ T6082] &journal->j_mutex --> &sbi->lock --> sb_writers#8 [ 36.229904][ T6082] [ 36.233218][ T6082] Possible unsafe locking scenario: [ 36.233218][ T6082] [ 36.235199][ T6082] CPU0 CPU1 [ 36.236675][ T6082] ---- ---- [ 36.238071][ T6082] rlock(sb_writers#8); [ 36.239218][ T6082] lock(&sbi->lock); [ 36.241001][ T6082] lock(sb_writers#8); [ 36.242796][ T6082] lock(&journal->j_mutex); [ 36.244040][ T6082] [ 36.244040][ T6082] *** DEADLOCK *** [ 36.244040][ T6082] [ 36.246170][ T6082] 1 lock held by syz-executor271/6082: [ 36.247640][ T6082] #0: ffff0000dd20c410 (sb_writers#8){.+.+}-{0:0}, at: mnt_want_write_file+0x64/0x1e8 [ 36.250304][ T6082] [ 36.250304][ T6082] stack backtrace: [ 36.251856][ T6082] CPU: 1 PID: 6082 Comm: syz-executor271 Not tainted 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 [ 36.254538][ T6082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 36.257204][ T6082] Call trace: [ 36.258083][ T6082] dump_backtrace+0x1b8/0x1e4 [ 36.259323][ T6082] show_stack+0x2c/0x44 [ 36.260447][ T6082] dump_stack_lvl+0xd0/0x124 [ 36.261657][ T6082] dump_stack+0x1c/0x28 [ 36.262738][ T6082] print_circular_bug+0x150/0x1b8 [ 36.264027][ T6082] check_noncircular+0x310/0x404 [ 36.265360][ T6082] __lock_acquire+0x3370/0x75e8 [ 36.266647][ T6082] lock_acquire+0x23c/0x71c [ 36.267799][ T6082] __mutex_lock_common+0x190/0x21a0 [ 36.269217][ T6082] mutex_lock_nested+0x2c/0x38 [ 36.270481][ T6082] do_journal_begin_r+0x2e0/0xe40 [ 36.271794][ T6082] journal_begin+0x110/0x2f4 [ 36.273024][ T6082] reiserfs_dirty_inode+0x104/0x204 [ 36.274441][ T6082] __mark_inode_dirty+0x2b0/0x10f4 [ 36.275842][ T6082] reiserfs_ioctl+0x330/0x42c [ 36.277091][ T6082] __arm64_sys_ioctl+0x14c/0x1c8 [ 36.278414][ T6082] invoke_syscall+0x98/0x2b8 [ 36.279672][ T6082] el0_svc_common+0x130/0x23c [ 36.280980][ T6082] do_el0_svc+0x48/0x58 [ 36.282129][ T6082] el0_svc+0x54/0x158 [ 36.283184][ T6082] el0t_64_sync_handler+0x84/0xfc [ 36.284544][ T6082] el0t_64_sync+0x190/0x194